10 Steps To Secure Remote Access Software

Remote access software has many useful areas of application like internal IT support, vendor support for software / hardware, accessing office computer from home pc, webinars, etc. However, remote access usage comes with a plethora of security concerns. In this article, I am enlisting some of the basic security measures to be taken by users of remote access software to protect their information assets. Continue reading “10 Steps To Secure Remote Access Software”

Did you know that 852 Indian Websites were defaced in April 2009?

A wrap up of some recent interesting information security news 

 

bullet     Indian Websites defaced

 

As per the official information released by CERT-In (the Computer Emergency Response Team operating under the Department of Information Technology, Govt of India), in Feb 2009 47 Indian websites were hacked, while in March 2009 46 Indian websites were hacked. 

 

This figure has jumped to an alarming 852 Indian websites in April 2009.

 

Refer the report at

www.cert-in.org.in/knowledgebase/SecurityBulletin/cisb-Apr09.htm

Continue reading “Did you know that 852 Indian Websites were defaced in April 2009?”